TECHNOLOGY > > Resilience


« Back to News

2021-06-28

Diversity In Cyber Security

Improving diversity should help cyber security teams deploy a wider range of thought and use stronger concepts to defend against attacks.

2021-06-24

Mobile Users Are A Security Weakspot

Remote Working & Mobile Access: IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever.

2021-06-22

Remote Working & Cyber Security

Remote working has become a normal practice but also has challenges, which are best overcome with effective security policies and the right training.

2021-06-21

A Quick Guide To Business Cyber Security

Whether you run a large complex organisation or a small startup, cyber crime has reached record levels and the threat of an attack is very real.

2021-06-18

Cyber Security In The Crypto World

The untraceable nature of Bitcoin and other crypto-currencies, along with Blockchain flaws, means that for hackers & scammers, it is an ideal target.

2021-06-16

Protecting Critical Infrastructure

Cyber attacks on critical infrastructure have a significant economic impact and securing these vital systems is all about controlling digital access.

2021-06-16

NCSC Focus On Ransomware Attacks

Early Warning: A free NCSC service designed to inform British organisations of potential ransom attacks at the earliest possible stage.

2021-06-14

Beware Of Credentials Phishing

Criminals are impersonating legitimate services by creating lookalike websites where unsuspecting users disclose their critical account information.

2021-06-14

Questions Business Leaders Should Ask Themselves

Business leaders need to take a firm grip on the cyber risks their organisations are facing and make sure they stay up to date with potential threats.

2021-06-10

Closing The Space Between Cybercrime & Cybersecurity

Failing to understand the intersection between the threats posed by cybersecurity and cybercrime leaves blind spots wide open to exploitation.

2021-06-08

Future Threats Are Growing Closer

Cyber security experts are becoming more concerned about the near term future when cyber attacks will be driven by Artificial Intelligence.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

HDI Global SE

HDI Global SE

HDI Global SE provides customised insurance solutions for industrial and commercial clients worldwide including Cyber Liability insurance.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

Maximus Consulting (MX)

Maximus Consulting (MX)

Maximus designs and delivers corporate-wide information security management system with our full-time IRCA Accredited consulting team.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

DMARC360

DMARC360

DMARC360 analyzes your email traffic patterns and sources, rapidly deploys email authentication protocols and monitors your email domains with automated recommendations and incident response.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Layer 8 Security

Layer 8 Security

Layer 8 Security is a cybersecurity advisory, consulting, and technical services firm that arms businesses with practical compliance, risk management, and security program strategies.